Zeros dos Polinômios Característicos dos Métodos BDF

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

dos métodos de investigação científica numa universidade particular

RESUMEN Este estudio descriptivo y exploratorio, tuvo como objetivo analizar las facilidades y dificultades referidas por quince alumnos de cursos de especialización en enfermería, en relación al proceso de enseñanza de la asignatura Métodos de Investigación Científica, enfocado en la referencia del paradigma del actuar comunicativo. Las categorías expresas como facilidades y dificultades en re...

متن کامل

FVIII-VWF dos-à-dos.

In this issue of Blood, back-to-back (dos-à-dos) papers by Chiu et al and Yee et al present complementary findings of structural investigations into the interaction between factor VIII (FVIII) and von Willebrand factor (VWF). The binding of FVIII to VWF contributes in a major way to the regulation of hemostasis.

متن کامل

Stealth DoS

Users and providers increasingly disagree on what Denial of Service (DoS) is. For example, an ISP might consider large multimedia downloads an attack to overload its infrastructure or have it pay high interconnection fees. On the other hand, a user will certainly consider selective bandwidth reduction that is used by ISPs as a countermeasure, as a DoS measure. Given the nature of their business...

متن کامل

Uma análise comparativa dos métodos de avaliação de sistemas colaborativos fundamentados na engenharia semiótica

Collaborative systems are growing more and more popular. However, evaluating this type of systems is still a difficult task. Many evaluation methods have been proposed to deal with this challenge, but most of them are not yet consolidated. Semiotic Engineering is an explanatory theory about HCI that proposes three different methods that can be applied to evaluate collaborative systems: MIS, MAC...

متن کامل

DoS Attacks Flood Techniques

DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TEMA - Tendências em Matemática Aplicada e Computacional

سال: 2007

ISSN: 2179-8451,1677-1966

DOI: 10.5540/tema.2007.08.01.0093